Loading summary
Dave Bittner
You're listening to the Cyberwire Network.
Jacob Oakley
Powered by N2, Krogle is AI built for the enterprise SOC. Fully private schema, free and capable of running in sensitive air gapped environments. Krogle autonomously investigates thousands of alerts weekly, correlating insights across your tools without data leaving your perimeter. Designed for high availability across geographies, it delivers context aware, auditable decisions aligned to your workflows. Krogle empowers analysts to act faster and focus on critical threats, replacing repetitive triage with intelligent automation to help your SOC operate at scale with precision and control. Learn more@krogle.com that's C R O gl.com Pro Russian hackers, scam lords and ransomware gangs face global justice Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a zero trust 2.0 cybersecurity strategy. Overstep malware targets outdated sonicwall secure mobile access devices. An Australian political party suffers a massive ransomware breach. Our guest Jacob Oakley speaks with T Minus Space Daily host Maria Ramazas. Jacob is technical director at 6th Gen and space lead for the Defcon Aerospace Village and an Italian YouTuber faces a retro reckon foreign July 17, 2025 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. We start with a global roundup of law enforcement activities. First, between July 14th and 17th, an international operation named Eastwood, coordinated by Europol and Eurojust, targeted the pro Russian cybercrime group Noname O5 7. Sixteen authorities from 13 core countries, including the US, Germany and France, worked together to dismantle the group's infrastructure, disrupting over 100 servers and taking major parts offline. Seven arrest warrants were issued, mainly for Russian nationals, and two individuals were detained. More than 1,000 supporters were warned of legal consequences. The group, which ran ideologically driven DDoS attacks, especially against Ukraine supporters and NATO members, used gamified tactics and crypto payments to recruit largely Russian speaking sympathizers. Europol provided intelligence, coordination and technical support, while Eurojust facilitated judicial cooperation. The operation also exposed a decentralized network that relied on automated tools, informal recruiting and propaganda to sustain cyberattacks elsewhere. Cambodia has arrested over 1000 suspects this week in a national crackdown on cybercrime following an order by Prime Minister Hun Manet. The move targets foreign led online scam operations that, according to global estimates, generate billions annually. Raids took place across at least five provinces, netting hundreds of suspects from Vietnam, China, Taiwan, Indonesia and other countries. Authorities seized computers and phones used in scams. Amnesty International recently accused the Cambodian government of complicity in human trafficking and forced labor within scam compounds, citing serious abuses. Many workers are lured under false promises and then held captive. The crackdown also unfolds amid rising tensions with Thailand over border disputes and cybercrime hubs where Thailand has taken unilateral actions, including border closures and power cuts. In other cyber enforcement news, Karen Serobovich Verdanyan, a 33 year old Armenian national, has been extradited from Ukraine to the US to face federal charges related to Ryuk ransomware attacks. Along with three other co conspirators, Vardanyan allegedly deployed ransomware from 2019 to 2020, extorting over $15 million in Bitcoin from US companies, including one in Oregon. Victims included schools, hospitals and local governments. Vardanyan pleaded not guilty and remains in custody pending trial. The FBI is investigating the case. With international support from Ukraine and France. Italian police have dismantled a Romanian ransomware group known as Disc Station, which targeted civil rights groups, film companies and nonprofits in northern Italy. The gang encrypted victim systems and demanded cryptocurrency ransoms. The investigation, launched after attacks in Lombardy, was coordinated with French and Romanian authorities. Raids in Bucharest led to multiple arrests and digital evidence seizures. A Milan judge ordered the detention of the suspected ringleader. DiskStation has exploited vulnerabilities in Synology NAS devices since at least 2021. Moving on Louis Vuitton has confirmed that recent customer data breaches in the uk, South Korea and Turkey are part of a single cyber incident believed to involve the Shiny Hunters extortion group. The breach, discovered on July 2, resulted in the unauthorized access and exfiltration of personal client data. Payment information was not affected. The company has notified regulators and is working with cybersecurity experts to investigate. Shiny Hunters is suspected to have accessed data via a compromised third party vendor, the same vector used in breaches at Deor, Tiffany and Adidas. Shiny Hunters has previously been linked to high profile cyber attacks, including the Snowflake breach, affecting major brands. Although French authorities recently arrested several breach forum members, some Shiny Hunters operators remain active, raising concerns about future incidents. The White House is developing a zero trust 2.0 cybersecurity strategy, aiming for more targeted and efficient cyber investments across federal agencies. Nick Polk from the Office of Management and Budget said the focus will shift from broad mandates to specific high impact initiatives. The Biden Era Zero Trust plan, released in 2022, required agencies to adopt layered defenses, but the new approach emphasizes results and investment efficiency. Additionally, the Trump administration's latest cybersecurity executive order scraps a vendor artifact requirement but keeps secure software attestations. The Defense Department is piloting new methods like continuous monitoring and software bills of materials, while civilian agencies will tailor security based on risk. Upcoming OMB guidance will also address drone security and and begin transitioning agencies to post quantum cryptography standards set by nist. A new malware called Overstep is targeting outdated Sonicwall secure mobile access devices, allowing hackers to maintain persistent hidden access and steal credentials. Google's Threat Intelligence Group links the attacks to UNC6148, an actor active since late 2023. The rootkit modifies the boot process and uses anti forensic tools to hide its tracks. Attackers may have started through a known vulnerability that provided admin credentials. UNC6148 has used stolen data in extortion attempts and may deploy Abyss ransomware. Researchers suspect Overstep was installed via a reverse shell, though how this access was achieved remains unclear. The malware allows remote access, password theft and log manipulation. Security experts urge organizations using SMA devices to create disk images for forensic analysis as standard inspection may miss the stealthy malware. Clive Parker's United Australia Party and Trumpets of Patriots suffered a ransomware attack in June, potentially exposing all their emails, documents and sensitive data. The breach, confirmed in a public notice, may include personal details such as email addresses, phone numbers, banking records and confidential documents. The parties admit they don't fully know what data was accessed and say notifying all affected individuals is impractical. They reported the incident to the Office of the Information Commissioner and Australian Signals Directorate. A party spokesperson claimed no contact with the attackers so far. Legal experts note that while political parties are largely exempt under Australia's Privacy act, recent legal changes may open the door to lawsuits. The breach is seen as a possible landmark case in data accountability for political groups. Coming up after the break, Jacob Oakley speaks with T Minus Space Daily host Maria Vermazes. Jacob is the space lead for the DEFCON Aerospace Village, and an Italian YouTuber faces a retro reckoning. Stay with us. Foreign hey everybody, Dave here. I've talked about Delete me before and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. Delete Me keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Deleteme team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal. 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K. Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Semperis created Purple Knight, the free security assessment tool that scans your Active directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using Purple Knight to stay ahead of threats. Download it now@sempras.com purple-knight that's sempris.com Purple Knight Jacob Oakley is Technical Director at 6gen and Space Lead for the DEFCON Aerospace Village. He recently spoke with our T Minus Space Daily host Maria Vermazes. Here's their conversation.
Maria Vermazes
I'm a company called 6gen, where I'm the technical director for the company and help push our strategic initiatives at the Count Anderson section of of Space and Cyber. I've been doing largely offensive security for about 20 years now. I started out in Marine Corps signals intelligence and then transitioned into the commercial world where I was doing red teaming, pen testing, that sort of thing. Most recently for the past five or six years, supporting the aerospace community and their partners. I am an adjunct faculty at Emory Riddle University, where I write and teach space tower courses for their master's programs. I'm a steering committee member of the IEEE Space System Cybersecurity Standard Working Group, and I serve as the space lead for the Aerospace Village.
Dave Bittner
Awesome. Jacob, you are the guy. I've been wanting to talk to you for a long time about the intersection of space and cyber. Having come from the cyber world and now moving into the space world, I've seen sort of a weird resistance to cybersecurity. And just the question that comes up to me is why it's so important. So what's the deal? Walk me through this.
Maria Vermazes
Yeah, I think there's, there's a couple of things. I guess we'll start with maybe the most important one first. You know, the aerospace community is largely made up of engineers, all different kinds of engineers. Right. RF engineers, electrical engineers, aerospace engineers, so on and so forth. But the thing about engineers is, even if it's different disciplines, right. I still have a really good idea of that person's technical capabilities, what kind of education they went through and their ability to apply their craft in terms of mathematics and engineering pedigree. Right. Cyber, that's, that's not so much the case. Right. Cyber has kind of been this term that has been used to whitewash much of what we used to maybe consider the IT industry and the security industry and some other things. I think you could really look at the forming of cybercom being to blame for that. If you look back in Google search history of like how popular a term is cyber, and cybersecurity didn't really become a search term until about 2010, which is when all of that happened. But so you have the government allocating a ton of funds to cyber initiatives because we've realized this is a problem. And you have a bunch of government organizations who haven't been able to get funding for things like IT infrastructure or help desk support compliance, right? And so they go, oh, if I just change this to a cyber analyst instead of a compliance analyst, suddenly I can access this funding. Right? And so you have the customer base does that and then you have the vendor based respond with, oh, I'll gladly sell you some buckets of cyber. Let me slap a cyber sticker on the site, I can sell it to you. Right. And so what that leads to is engineer to engineer. Even if from different disciplines, they kind of have an understanding of what that person is and what their experience is. But if you introduce yourself as, hey, I'm a cyber security professional, will they have no idea what they. Are you red team or are you help desk person? Do you do like routing infrastructure? Do you do cloud stuff? Right. And so there's kind of an inherent mistrust there. The engineers kind of look at it like, well, I don't even know what your minimum standard or low bar is to become a cybersecurity professional. So I'm going to be resistant to the things you're going to tell me. And I think you add that to the fact that I've kind of noticed two things as I've worked with aerospace. You know, usually as a hacker, I'm the most risk averse person in a conversation. Right. If I'm talking with a CEO, I'm trying to tell them to worry more about the problems they have and that they need to fix them. Well, tell an aerospace person they need to worry more about their system getting hacked. They're like, hey buddy, I just hope this thing wakes up in space, right? Like, I'm worried about it. Getting hacked might be the 30th most scary thing on my list. And then the other is that usually as a hacker, right, As a red teamer or pen tester or something like that, like, I'm usually the most technical person in the conversation if I'm talking to a CISO or a CEO, right? Like, I'm giving technical facts about my profession to convince them to make some change. When you run into, you know, an electrical engineer, for instance, right? They're going to go, hey man, I know how the computer actually works. So if you're going to give me advice on how to make this thing more secure, I'm going to ask you seven times if you're sure and make you prove it to me. Also because of that other talked about.
Dave Bittner
So there's also, within the space cyber world, there's maybe not a well understood sort of common ground of key events that have happened or even sort of a common knowledge set that everyone who is in the space cyber world should have to speak maybe the same language or at least understand key events. What do you think about that idea?
Maria Vermazes
I think we could answer that two different ways, right? The common ground aspect suffers from some of the stuff we've already discussed, right? Maybe exacerbated by the fact that like, engineering is sort of like a finite game. There's rules and there's a timeline. And I know who the other people are playing are like, engineer is handed a task like, hey, go build this engine that can go this fast with this much fuel and X, Y and Z and solve for that. And you've done a successful job in engineering, right? Cyber is more like an infinite game. You're just trying to keep playing. You want to keep your organization running despite the cyber threats you face. The adversaries can come and go. They don't have any rules, there's no timelines, right? And so the cybersecurity professional has to approach their problem set that way. And the engineering side of the house approaches their problem with a very finite mindset. And what you have a lot in organizations is, well, I've got an electrical engineer who knows how to program. So I'm just going to have that person do my cyber stuff. Well, they're going to approach the cyber problem with a finite mindset. And you do that when you try to apply finite solutions to an infinite problem. You have like what happens to the US and Vietnam and Afghanistan, right? The adversary, it's just trying to keep playing and eventually we give up trying to win and we leave. Right. So, but from a commonality of what is the technical position we should share together to approach these problems, I think that gets really conflated because of how the aerospace industry is really, really good at dealing with risk and redundancies and those are things they've dealt with for a very long time. And they try to sort of fit the cyber, you know, square peg in that round hole.
Dave Bittner
So what's the path forward? I just wonder how this is quite a bridge to gap or gap to bridge rather, how do we, how do we get, how do we go?
Maria Vermazes
I think you can look at it in two ways, right? Like what are the solutions we provide to help solve that problem? And the other is like, how do we start addressing the cultural issue? I think the cultural issue really has to come first because you have to get people to listen or you'll allow them to implement cybersecurity somewhere. The best path forward there honestly is you have to treat cyber security as one of the engineering disciplines required in making a spacecraft. Right. And so when a program stands up to begin design and then development of a space system, oftentimes the end is when they do a cyber compliance check where they do a third party assessment. You're good or you're not, but really having, you know, there's weekly meetings when you're building a space program, if not more often, where you have the RF engineer and the mechanical engineer and the aerospace engineer, they're all present, they're all discussing at what state the space vehicle is in its design or development. Right. And what's changed and how that's going to affect everybody else. Having cybersecurity representation in those meetings allows for cyber requirements to be just like thermal requirements of the space vehicle. And it'll get developed along the way accordingly. Because like, what usually happens is, you know, two years into this thing, they've already ordered their software defined radios and then the cyber person's like, hey, those use a OS that's vulnerable. And they're like, well, it takes me 12 months to reorder that part and we'll miss our launch window. So we're just going to put it up there. If you get the cyber person there when you were making the decisions about the software defined radio as well, they could ask you what are you looking at? And go look at the operating systems that come with them and then you kind of head that off a much early on in the design development process. So culturally, I think it's, it's really getting the aerospace community to appreciate cybersecurity as just one of the other engineering things that now has to go into building and operating spacecraft. From the solutions perspective, it's also an uphill battle because there's a huge obsession with flight heritage, right? Like you have a radio that's 10 times faster, better, cheaper, and they'd gladly pay 100 times the price for something that's already flown before. And so when you think about what that means for the vendor base, it's like, well, are vendors going to go out on a limb and base rate their cybersecurity solution, hoping somebody's going to buy it? Right. Like, I think that might have to get flipped on its head a little bit where the aerospace community reaches out a little bit to the cyber side and says, how do we prove out some of this stuff so it can be more widely accepted?
Dave Bittner
I can't help but wonder about specialized knowledge and the broad swath of cybersecurity security professionals that we have out there. I would imagine working with space systems is a very specialized skill set that, how does one even acquire that knowledge? Especially if you're, you're already maybe starting out in your career and you go, I want to work in space. What do we point people to?
Maria Vermazes
Yeah, it's tough. The investment and skill set is going to be higher for space and you have a much smaller subset of customers to go sell that service to, right? So the value proposition of getting the cyber security side to invest in developing those skills is really not going to be there. Find me the cyber person that doesn't like Star wars or Star Trek or something else, right? Like, so there's like every time there's people that want to do this, I think it's very difficult. The other question I get asked is, what would you rather take? Would you rather take like an electrical engineer who's worked on aerospace programs and teach them how to be a hacker or teach a hacker? Right? And it's, well, if you're forcing me to that function, I'm going to take the aerospace person because that's the harder skills to go get, right? If you, if you have a person from the aerospace community who's an engineer but who's willing to think outside the box and with that infinite mindset and is curious like a hacker, like, that's probably not that anyone would be more qualified than the other, but that's going to take less of an investment to turn them into a Space Cyber professional than the the converse.
Jacob Oakley
That's Jacob Oakley from 6th Gen, speaking with our T Minus Space Daily host Maria Vermazes. Be sure to check out the T Minus Space Daily Podcast wherever you get your favorite podcasts. You hear from us here at the Cyberwire Daily every single day now. We'd love to hear from you. Your voice can help shape the future of N2K networks. Tell us what matters most to you by completing our annual audience survey. Your insights help us grow to better meet your needs. There's a link to the survey in our show Notes. We're collecting your comments through August 31st. Thanks. We've all been there. You realize your business needs to hire someone yesterday. How can you find amazing candidates fast? Well, it's easy. Just use Indeed when it comes to hiring, Indeed is all you need. Stop struggling to get your job post noticed. Indeed Sponsored Jobs helps you stand out and hire fast. Your post jumps to the top of search results so the right candidates see it first and it works. Sponsored Jobs on indeed get 45% more applications than non sponsored ones. One of the things I love about Indeed is how fast it makes hiring. And yes, we do actually use Indeed for hiring here at N2K CyberWire. Many of my colleagues here came to us through Indeed plus with Sponsored Jobs. There are no subscriptions, no long term contracts. You only pay for results. How fast is Indeed? Oh, in the minute or so that I've been Talking to you, 23 hires were made on Indeed according to Indeed Data Worldwide. There's no need to wait any longer. Speed up your hiring right now with Indeed and listeners to this show will get a $75 sponsored job credit. To get your jobs more visibility at indeed.com cyberwire just go to indeed.com cyberwire right now and support our show by saying you heard about Indeed on this podcast. Indeed.com cyberwire terms and conditions apply. Hiring Indeed is all you need. Krogle is AI built for the enterprise soc, fully private schema free and capable of running in sensitive air gapped environments. Krogle autonomously investigates thousands of alerts weekly, correlating insights across your tools without data leaving your perimeter. Designed for high availability across geographies, it delivers context aware, auditable decisions aligned to your workflows. Krogle empowers analysts to act faster and focus on critical threats, replacing repetitive triage with intelligent automation to help your SOC operate at scale with precision and control. Learn more@krogle.com that's C-R-O GL.com and finally Italy is known for fine wine, ancient ruins, and as YouTuber once were, nerd just discovered some of the strictest copyright enforcement this side of the Alps. The retro gaming enthusiast who reviews Android based handheld consoles loaded with old school games recently had his collection of nostalgia confiscated by the Gargia di Financa, Italy's economic and copyright watchdog. The agents showed up with a search warrant in April, seizing over 30 consoles and requesting emails with device makers. While emulation itself is legal, many of these consoles come preloaded with pirated game ROMs, something Italian authorities aren't about to overlook. The creator could face charges under Article 171 of Italy's copyright law, which carries up to three years in prison. Italy does not mess around. From forcing Google to block pirated soccer streams to now eyeing YouTubers, its message is clear. If you're profiting off copyrighted content, even indirectly, you'd better save your progress. And that's the Cyber Wire. For links to all of today's stories, check out our daily briefing@thecyberwire.com we'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights through the end of this summer. There's a link in the show Notes. Please do check it out. N2K's senior producer is Alice Carruth. Our Cyberwire producer is Liz Stokes. We're mixed by Trey Hester with original music by Elliot Peltzman. Our executive producer is Jennifer Ibin. Peter Kilpe is our publisher and I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. Hi Kim Jones. Here on CISO Perspectives, we get candid with the thinkers, doers and trailblazers shaping cybersecurity leadership. No scripts, no sales pitches, just real stories and hard earned lessons from folks who've been there. If you're looking to grow as a leader or just want to hear how others are navigating this ever evolving field, listen to CISO Perspectives. It's your seat at the table. Buying more tools won't make you more secure. Continually training your people will. In this episode, Cloud Range co founder and CEO Debbie Gordon shares how real world simulations are transforming readiness in 2025. Because your last line of defense isn't software, it's your team. Tune in now. Your stack depends on it.
CyberWire Daily Episode Summary: "When Hackers Become the Hunted" Release Date: July 17, 2025 | Host: N2K Networks
In a significant international crackdown, Europol and Eurojust spearheaded Operation Eastwood from July 14th to 17th, targeting the pro-Russian cybercrime faction Noname O5 7. Coordinated efforts involved sixteen authorities across thirteen countries, including the United States, Germany, and France.
Disruptions and Arrests: The operation successfully dismantled over 100 servers, issuing seven arrest warrants primarily against Russian nationals and detaining two individuals. Additionally, over 1,000 supporters received warnings about potential legal repercussions.
Modus Operandi: Noname O5 7 was known for orchestrating ideologically driven DDoS attacks targeting Ukrainian supporters and NATO members. They employed gamified recruitment tactics and cryptocurrency payments to attract Russian-speaking sympathizers. Europol provided essential intelligence and technical support, while Eurojust facilitated judicial cooperation.
Decentralized Network Exposure: The operation unveiled a decentralized network reliant on automated tools, informal recruitment, and propaganda, enabling sustained cyberattacks globally.
Cambodia intensified its fight against cybercrime, arresting over 1,000 suspects in a national sweep initiated by Prime Minister Hun Manet. The focus was on dismantling foreign-led online scam operations, which global estimates peg at generating billions annually.
Raid Details: Authorities conducted raids across at least five provinces, apprehending suspects from Vietnam, China, Taiwan, Indonesia, and other nations. Seizures included computers and phones used in scamming activities.
Human Rights Concerns: Amnesty International criticized the Cambodian government for alleged complicity in human trafficking and forced labor within scam operations. Reports highlighted severe abuses where workers were deceived with false promises and subsequently held captive.
Regional Tensions: The crackdown coincided with escalating tensions between Cambodia and Thailand over border disputes and cybercrime hubs. Thailand has previously responded with unilateral measures, including border closures and power outages.
Karen Serobovich Verdanyan's Extradition: Verdanyan, a 33-year-old Armenian national, was extradited from Ukraine to the United States to face federal charges related to Ryuk ransomware attacks. Alongside three co-conspirators, Verdanyan is accused of extorting over $15 million in Bitcoin from U.S. entities, including schools, hospitals, and local governments between 2019 and 2020. (Timestamp [17:00])
DiskStation Ransomware Group: Italian authorities, with support from French and Romanian counterparts, dismantled Disk Station, a Romanian ransomware gang targeting civil rights organizations, film companies, and nonprofits in Northern Italy. The group's activities included exploiting vulnerabilities in Synology NAS devices since at least 2021. Multiple arrests were made in Bucharest, and a Milan judge has ordered the detention of the suspected ringleader. (Timestamp [12:30])
Louis Vuitton's Data Breach: Louis Vuitton confirmed that recent customer data breaches in the UK, South Korea, and Turkey stemmed from a single cyber incident attributed to the Shiny Hunters extortion group. Discovered on July 2, the breach led to unauthorized access and exfiltration of personal client data, excluding payment information.
Attack Vector: The breach likely occurred through a compromised third-party vendor, a method previously used in attacks on Deor, Tiffany, and Adidas.
Group Activity: Although French authorities have arrested several members of Shiny Hunters, some operators remain active, posing ongoing threats. (Timestamp [10:00])
The White House is developing a Zero Trust 2.0 strategy aimed at enhancing cybersecurity investments across federal agencies with a focus on precision and efficiency.
Strategic Shift: As Nick Polk from the Office of Management and Budget (OMB) stated, the new strategy will transition from broad mandates to specific, high-impact initiatives. This contrasts with the Biden Era Zero Trust plan of 2022, which emphasized layered defenses.
Key Focus Areas:
(Timestamp [11:50])
A new malware strain, Overstep, is targeting outdated SonicWall Secure Mobile Access (SMA) devices, enabling persistent, hidden access and credential theft.
Attack Attribution: Google's Threat Intelligence Group associates Overstep with UNC6148, a threat actor active since late 2023.
Technical Details: Overstep modifies the boot process and employs anti-forensic tools to evade detection. Initial access may have been gained through known vulnerabilities allowing administrative credentials. The malware facilitates remote access, password theft, and log manipulation.
Response Recommendations: Security experts advocate for organizations using SMA devices to create disk images for thorough forensic analysis, as standard inspections might overlook Overstep's stealthy operations.
(Timestamp [11:30])
The United Australia Party and Trumpets of Patriots experienced a ransomware assault in June, potentially exposing all their emails, documents, and sensitive data.
Breach Impact: The attack may have compromised personal details, including email addresses, phone numbers, banking records, and confidential documents. The parties have acknowledged the breach but lack comprehensive data on the extent of the exposure.
Regulatory Response: The incident was reported to the Office of the Information Commissioner and the Australian Signals Directorate. A party spokesperson mentioned no direct contact with the attackers thus far.
Legal Implications: While political parties in Australia are largely exempt under the Privacy Act, recent legal changes may pave the way for potential lawsuits. This breach is considered a possible landmark case in data accountability for political entities.
(Timestamp [12:00])
Guest: Maria Ramazas, Host of T Minus Space Daily
Guest Expert: Jacob Oakley, Technical Director at 6th Gen and Space Lead for DEFCON Aerospace Village
Key Topics Discussed:
Intersection of Space and Cybersecurity: Maria Ramazas highlighted the challenges in integrating cybersecurity within the aerospace community, which is traditionally dominated by various engineering disciplines. She emphasized the cultural and technical gaps that exist between engineers and cybersecurity professionals.
Cultural Integration: The discussion underscored the necessity of treating cybersecurity as an integral engineering discipline during the spacecraft design and development processes. Regular interdisciplinary meetings can ensure cyber requirements are addressed alongside other technical specifications.
Skill Set Specialization: Jacob Oakley pointed out the scarcity of cybersecurity professionals with expertise in space systems. He suggested that it is more feasible to train aerospace engineers with cybersecurity acumen than to convert cybersecurity experts to the nuances of space systems.
Future Pathways: The conversation concluded with strategies to bridge the cultural and technical divides, advocating for early and continuous integration of cybersecurity within aerospace projects to mitigate risks effectively.
(Timestamp [14:05] - [23:28])
Italy intensified its enforcement of copyright laws, targeting content creators who profit from copyrighted material.
Case in Point: An Italian YouTuber known for retro gaming reviews had his collection of over 30 handheld consoles confiscated by the Gargia di Financa (Italy's economic and copyright watchdog). Authorities obtained a search warrant in April, seizing devices and requesting correspondence with device manufacturers.
Legal Ramifications: While emulation is legal in Italy, the consoles in question were preloaded with pirated game ROMs, leading to potential charges under Article 171 of Italy's copyright law, punishable by up to three years in prison.
Broader Implications: This action signifies Italy's stringent stance on copyright infringement, as seen in previous actions like forcing Google to block pirated soccer streams. Content creators are now under increased scrutiny, with authorities sending a clear message against profiting from unauthorized content.
(Timestamp [24:30])
This episode of CyberWire Daily, titled "When Hackers Become the Hunted," provided a comprehensive overview of significant global cybersecurity events, law enforcement actions against cybercriminals, corporate data breaches, and emerging threats. The in-depth interview shed light on the critical intersection between space systems and cybersecurity, highlighting the need for cultural and technical integration within the aerospace sector. Additionally, the episode underscored the increasing rigor of international enforcement against copyright infringements, emphasizing the heightened risks for content creators.
For detailed insights and discussion, listeners are encouraged to explore the full podcast episode available through N2K Networks.